Physical Security Executive Commentary

  1. The Top 5 Ways Universities Confirm Student Identity Through Access Control
    8/31/2015

    As students return to school, packing lecture halls and moving into dorm rooms in the colleges and universities, officials behind the scenes look for ways to safeguard the students, faculty, and assets. To accomplish this feat, today’s higher education organizations look for a combination of policies and new technology solutions.

  2. 2015: The Year of Mobile
    8/28/2015

    As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.

  3. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems
    8/25/2015

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

  4. The Growing Value Of Video Data: Ensure Your IT Clients’ Video Investment Is Protected
    8/24/2015

    Today’s IT and surveillance leaders are constantly on the lookout for new ways to gather, manage and store data to run their departments more efficiently, as well as maintain budgets and contribute to the overall success of the business. Video surveillance is a valuable tool to help maintain a secure environment, and as such, the amount of video surveillance tools deployed continues to increase.

  5. What SMBs Are Looking For From Their IT Solutions Providers
    8/20/2015

    I do coaching for one of our member’s sales executives. Their owner asked for some feedback on a blog we were reviewing. One of the sales executives replied with the following...

  6. MSP Sales Teams: Not Just From IT Backgrounds Anymore
    8/20/2015

    I read an interesting interview by Jill Konrath of Brent Adamson, coauthor of “The Challenger Sale.” In the interview, Mr. Adamson talks about some of the research they have done around the point in the sale when the purchaser engages with the supplier.

  7. What To Consider When Planning Your Business Exit Strategy (Part II)
    8/20/2015

    In the first post of this series, I talked about the financial preparation required to maximize your outcome when you exit your business. Of course, that assumes you will sell or value the company at exit.

  8. Managing Risks In Utility And Substation Physical Security
    8/13/2015

    Traditionally, electrical substation security was aimed only at preventing access to stop vandalism and improve safety. But today, security efforts have been redefined to address new threats in order to protect critical infrastructure. Substations are a critical element in the distribution of high-voltage electrical networks, and any disruption can have a severe negative impact on society.

  9. Ask The Consultant: How To Have One-To-One Meetings That Matter To Your IT Solutions Provider Team
    7/30/2015

    In business, we often talk about mission, vision, and values to our teams and the importance of ongoing discussions and communications around those major themes. 

  10. How High Resolution Cameras, Big Data Analytics Are Impacting Video Storage Needs
    7/28/2015

    The IP surveillance camera market has come a long way in the last decade and is constantly changing and evolving, with manufacturers that push the envelope when it comes to producing bigger and better technology. Today’s camera manufacturers create cameras with an entire system on the edge, greater frame rates, better compression, more security, increasing capabilities (such as day/night or light sensitivity), and much, much more.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.